
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Sadaf Hina, Dhanapal Durai Dominic Panneer Selvam, Paul Benjamin Lowry
Computers & Security (2019) Vol. 87, pp. 101594-101594
Closed Access | Times Cited: 83
Showing 1-25 of 83 citing articles:
Information security governance challenges and critical success factors: Systematic review
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Computers & Security (2020) Vol. 99, pp. 102030-102030
Closed Access | Times Cited: 86
Sultan AlGhamdi, Khin Than Win, Elena Vlahu‐Gjorgievska
Computers & Security (2020) Vol. 99, pp. 102030-102030
Closed Access | Times Cited: 86
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72
Sebastian Schuetz, Paul Benjamin Lowry, Daniel Pienta, et al.
Journal of Management Information Systems (2020) Vol. 37, Iss. 3, pp. 723-757
Closed Access | Times Cited: 72
The role of cybersecurity and policy awareness in shifting employee compliance attitudes: Building supply chain capabilities
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
Lai‐Wan Wong, Voon‐Hsien Lee, Garry Wei–Han Tan, et al.
International Journal of Information Management (2022) Vol. 66, pp. 102520-102520
Closed Access | Times Cited: 69
A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
Bongsik Shin, Paul Benjamin Lowry
Computers & Security (2020) Vol. 92, pp. 101761-101761
Closed Access | Times Cited: 62
Bongsik Shin, Paul Benjamin Lowry
Computers & Security (2020) Vol. 92, pp. 101761-101761
Closed Access | Times Cited: 62
Towards a wearable education: Understanding the determinants affecting students’ adoption of wearable technologies using machine learning algorithms
Mostafa Al‐Emran, Maryam Nasser Al-Nuaimi, İbrahim Arpacı, et al.
Education and Information Technologies (2022) Vol. 28, Iss. 3, pp. 2727-2746
Closed Access | Times Cited: 36
Mostafa Al‐Emran, Maryam Nasser Al-Nuaimi, İbrahim Arpacı, et al.
Education and Information Technologies (2022) Vol. 28, Iss. 3, pp. 2727-2746
Closed Access | Times Cited: 36
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
Naurin Farooq Khan, Naveed Ikram, Hajra Murtaza, et al.
Computers & Security (2022) Vol. 125, pp. 103049-103049
Closed Access | Times Cited: 34
Organizational and team culture as antecedents of protection motivation among IT employees
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
Shwadhin Sharma, Eduardo Aparicio
Computers & Security (2022) Vol. 120, pp. 102774-102774
Open Access | Times Cited: 29
Security Education, Training, and Awareness Programs: Literature Review
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
Siqi Hu, Carol Hsu, Zhongyun Zhou
Journal of Computer Information Systems (2021) Vol. 62, Iss. 4, pp. 752-764
Closed Access | Times Cited: 35
Cybersecurity Behavior among Government Employees: The Role of Protection Motivation Theory and Responsibility in Mitigating Cyberattacks
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain, et al.
Information (2022) Vol. 13, Iss. 9, pp. 413-413
Open Access | Times Cited: 27
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Suhaidah Hussain, et al.
Information (2022) Vol. 13, Iss. 9, pp. 413-413
Open Access | Times Cited: 27
Cyber-security and risky behaviors in a developing country context: a Pakistani perspective
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, et al.
Security Journal (2022) Vol. 36, Iss. 2, pp. 373-405
Open Access | Times Cited: 25
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem, et al.
Security Journal (2022) Vol. 36, Iss. 2, pp. 373-405
Open Access | Times Cited: 25
The Effect of Organizational Information Security Climate on Information Security Policy Compliance: The Mediating Effect of Social Bonding towards Healthcare Nurses
Ke Dong, Rao Faizan Ali, P.D.D. Dominic, et al.
Sustainability (2021) Vol. 13, Iss. 5, pp. 2800-2800
Open Access | Times Cited: 31
Ke Dong, Rao Faizan Ali, P.D.D. Dominic, et al.
Sustainability (2021) Vol. 13, Iss. 5, pp. 2800-2800
Open Access | Times Cited: 31
Exploring the Influence of Direct and Indirect Factors on Information Security Policy Compliance: A Systematic Literature Review
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 30
Mada Alassaf, Ali Alkhalifah
IEEE Access (2021) Vol. 9, pp. 162687-162705
Open Access | Times Cited: 30
Stock market reactions to favorable and unfavorable information security events: A systematic literature review
Syed Emad Azhar Ali, Fong‐Woon Lai, P.D.D. Dominic, et al.
Computers & Security (2021) Vol. 110, pp. 102451-102451
Open Access | Times Cited: 28
Syed Emad Azhar Ali, Fong‐Woon Lai, P.D.D. Dominic, et al.
Computers & Security (2021) Vol. 110, pp. 102451-102451
Open Access | Times Cited: 28
Green HRM and employee efficiency: The mediating role of employee motivation in emerging small businesses
Ali Junaid Khan, Waseem Ul Hameed, Jawad Iqbal, et al.
Frontiers in Environmental Science (2022) Vol. 10
Open Access | Times Cited: 22
Ali Junaid Khan, Waseem Ul Hameed, Jawad Iqbal, et al.
Frontiers in Environmental Science (2022) Vol. 10
Open Access | Times Cited: 22
Cyber–Information Security Compliance and Violation Behaviour in Organisations: A Systematic Review
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 20
Noor Suhani Sulaiman, Muhammad Ashraf Fauzi, Walton Wider, et al.
Social Sciences (2022) Vol. 11, Iss. 9, pp. 386-386
Open Access | Times Cited: 20
Effects of socioeconomic and digital inequalities on cybersecurity in a developing country
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12
Naurin Farooq Khan, Naveed Ikram, Sumera Saleem
Security Journal (2023) Vol. 37, Iss. 2, pp. 214-244
Open Access | Times Cited: 12
Exploring Eustress and Fear: A New Perspective on Protection Motivation in Information Security Policy Compliance within the Financial Sector
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4
Akshay Aggarwal, Shashi Srivastava
Computers & Security (2024) Vol. 142, pp. 103857-103857
Closed Access | Times Cited: 4
Conceptual Inconsistencies in Variable Definitions and Measurement Items within ISP Non-/compliance Research: A systematic literature review
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Marcus Gerdin, Åke Grönlund, Ella Kolkowska
Computers & Security (2025), pp. 104365-104365
Closed Access
Unraveling the Role of Citizens' Concerns and Cognitive Appraisals in E‐Government Adoption: The Impact of Social Media and Trust
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
Phuong V. Nguyen, Demetris Vrontis, Linh Anh Nguyen, et al.
Strategic Change (2025)
Closed Access
End-User Compliance with Information Security Policy Framework for Government Departments in South Africa
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Sakhile Charity Dories Lekhuleni, Adéle da Veiga
Communications in computer and information science (2025), pp. 365-377
Closed Access
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17
Simon Vrhovec, Igor Bernik, Blaž Markelj
Computers & Security (2022) Vol. 125, pp. 103038-103038
Open Access | Times Cited: 17
Tri-channel visualised malicious code classification based on improved ResNet
Sicong Li, Jian Wang, Yafei Song, et al.
Applied Intelligence (2024) Vol. 54, Iss. 23, pp. 12453-12475
Open Access | Times Cited: 3
Sicong Li, Jian Wang, Yafei Song, et al.
Applied Intelligence (2024) Vol. 54, Iss. 23, pp. 12453-12475
Open Access | Times Cited: 3
Implementing artificial intelligence in academic and administrative processes through responsible strategic leadership in the higher education institutions
Suleman Ahmad Khairullah, Sheetal Harris, Hassan Jalil Hadi, et al.
Frontiers in Education (2025) Vol. 10
Open Access
Suleman Ahmad Khairullah, Sheetal Harris, Hassan Jalil Hadi, et al.
Frontiers in Education (2025) Vol. 10
Open Access
Theoretical Framework and Hypotheses Development
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 77-100
Closed Access
Rathika Palanisamy, Azah Anir Norman, Miss Laiha Mat Kiah, et al.
(2025), pp. 77-100
Closed Access
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable Within Behavioral Cybersecurity Research
W. Alec Cram, John D’Arcy
Information Systems Frontiers (2025)
Closed Access
W. Alec Cram, John D’Arcy
Information Systems Frontiers (2025)
Closed Access